US10390217B2 - Wireless configuration of wireless distribution system (WDS) Wi-Fi range extenders using non-Wi-Fi-wireless communication channels - Google Patents
Wireless configuration of wireless distribution system (WDS) Wi-Fi range extenders using non-Wi-Fi-wireless communication channels Download PDFInfo
- Publication number
- US10390217B2 US10390217B2 US15/391,790 US201615391790A US10390217B2 US 10390217 B2 US10390217 B2 US 10390217B2 US 201615391790 A US201615391790 A US 201615391790A US 10390217 B2 US10390217 B2 US 10390217B2
- Authority
- US
- United States
- Prior art keywords
- base station
- wireless
- slave base
- network
- wds
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related, expires
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W76/00—Connection management
- H04W76/10—Connection setup
- H04W76/15—Setup of multiple wireless link connections
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W16/00—Network planning, e.g. coverage or traffic planning tools; Network deployment, e.g. resource partitioning or cells structures
- H04W16/24—Cell structures
- H04W16/26—Cell enhancers or enhancement, e.g. for tunnels, building shadow
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W8/00—Network data management
- H04W8/22—Processing or transfer of terminal data, e.g. status or physical capabilities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W24/00—Supervisory, monitoring or testing arrangements
- H04W24/02—Arrangements for optimising operational condition
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W84/00—Network topologies
- H04W84/02—Hierarchically pre-organised networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
- H04W84/10—Small scale networks; Flat hierarchical networks
- H04W84/12—WLAN [Wireless Local Area Networks]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W84/00—Network topologies
- H04W84/18—Self-organising networks, e.g. ad-hoc networks or sensor networks
- H04W84/20—Master-slave selection or change arrangements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W88/00—Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
- H04W88/02—Terminal devices
- H04W88/06—Terminal devices adapted for operation in multiple networks or having at least two operational modes, e.g. multi-mode terminals
Definitions
- the invention relates generally to a computerized networking system, and more specifically, to configuration of wireless distribution system (WDS) nodes that extend Wi-Fi network range using a mobile station with alternate networking capabilities.
- WDS wireless distribution system
- Plug and play networking equipment makes networking friendlier for consumers installing a Wi-Fi (e.g., under a IEEE 802.11 protocol as promulgated by the Institute of Electrical and Electronics Engineers) system out of the box. Entities also desire less complex configurations when making changes to network equipment.
- range extenders are added at “dead areas” to provide extended Wi-Fi access. For example, a range extender can add coverage to a backyard of a home. Also, a range extender can connect two buildings of a corporation.
- WDS is a technique for an access point acting as a master base station to connect with access points acting as slave base stations for extending Wi-Fi range.
- the master base station needs to receive MAC addresses of the slave base stations, and likewise, the slave base stations need to receive a MAC address of the base station.
- Other parameters in common include an SSID, a wireless channel, and an encryption mode.
- conventional techniques accomplish configurations with a series of wired connections.
- a configuration server detects a network change and initiates a configuration process.
- a smartphone executing a mobile app communicates with the configuration server with a cellular data network transceiver (e.g., a 3G or 4G transceiver), and communicates with slave base stations with a Bluetooth transceiver (e.g., a BTLE transceiver) or other one-to-many wireless channel.
- the configuration server also communicates over a wired connection with a master base station to synchronize WDS configuration data between the master and slave base stations.
- WDS configuration data is dynamically generated to prevent rogue devices from using preconfigured WDS configuration.
- a smartphone executing a mobile app communicates directly with a master base server with a Wi-Fi transceiver, and with a slave base server with a Bluetooth transceiver for synchronizing WDS configuration data.
- FIGS. 1A & 1B are high-level block diagrams illustrating systems for wireless configuration of wireless distribution nodes using a mobile station, according to one embodiment.
- FIG. 2 is a more detailed block diagram illustrating a configuration server of the system of FIG. 1A , according to one embodiment.
- FIG. 3 is a more detailed block diagram illustrating a master base station of the system of FIG. 1 , according to one embodiment.
- FIG. 4 is a more detailed block diagram illustrating an slave base station of the system of FIG. 1 , according to an embodiment.
- FIG. 5 is a more detailed block diagram illustrating a wireless station of the system of FIG. 1 , according to an embodiment.
- FIG. 6A-6B is a sequence diagram illustrating interactions between components of the system in FIG. 1 , according to one embodiment.
- FIG. 7 is a high-level flow diagram illustrating a method for wirelessly configuring wireless distribution nodes using a mobile station, according to one embodiment.
- FIG. 8 is a more detailed flow diagram illustrating a first embodiment of a step of synchronizing WDS configuration data between the master base station and the slave base station, from the method of FIG. 7 .
- FIG. 9 is a more detailed flow diagram illustrating a second embodiment of a step of synchronizing WDS configuration data between the master base station and the slave base station, from the method of FIG. 7 .
- FIG. 10 is a block diagram illustrating an exemplary computing device for implementing the techniques described herein, according to one embodiment.
- FIGS. 1A-1B are high-level block diagram illustrating wireless WDS configuration of network nodes, according to one embodiment.
- the system 100 A of FIG. 1A comprises a configuration server 110 , a master base station 120 , slave base stations 130 A-C, and a wireless station 140 .
- additional network components can also be part of the systems 100 A and 100 B, such as firewalls, virus scanners, routers, switches, application servers, databases, as well as additional controllers, access points, access switches, stations, and the like.
- the network components as set forth throughout the different embodiments described herein can be implemented as hardware, software, or a combination of both.
- the systems 100 A and 100 B can be implemented in home networking systems with easy consumer set-up. Also, enterprise networking systems can be quickly deployed and relocated.
- the components can communicate through a network 101 .
- the network 101 couples the configuration server 110 to the master base station 120 , preferably over a wired connection.
- the master base station 120 couples to the slave base station 130 , and the wireless station, through wireless connections.
- the network 101 can be the Internet, a wide area network, a local area network, an enterprise network, or the like.
- the network 101 can be a data network or a cellular network (e.g., 3G or 4G), or a combination of different types of networks.
- a base station 102 communicates through the network 101 (e.g., indirectly through a gateway directly coupled to the network 101 ).
- the configuration server 110 bridges the master base server 120 and the slave base server 130 during configuration of the system 100 A. More specifically, WDS configuration data is synchronized between the master and slave base stations 120 , 130 in facilitating a wireless connection between the master and slave base stations 120 , 130 in this embodiment.
- the wireless station 140 can include an application that establishes a secure connection for receiving dynamic WDS configuration data over a cellular data network transceiver (e.g., 3G or 4G), and next, transmitting the dynamic WDS configuration data over a Bluetooth transceiver.
- a cellular data network transceiver e.g., 3G or 4G
- On the other data path between the configuration server 110 and the master base station 120 can be a secure connection over an Ethernet port for a wired connection.
- the data path includes an interface between a data network used by the configuration sever 110 and a cellular network used by the wireless station 110 .
- the WDS configuration data is synchronized by the configuration server to facilitate a connection between the master and slave base stations 120 , 130 , in one embodiment.
- WDS configuration data in one embodiment, includes MAC addresses, BSSIDs, authentication credentials, wireless channels, encryption modes (e.g., certificates or shared secrets), and other information necessary for a Wi-Fi connection between the master and slave base stations 120 , 130 .
- the WDS configuration data also includes authentication information or other security information.
- Dynamic WDS information in another embodiment, can comprise WDS parameters generated on-the-fly to avoid prior art out-of-the-box WDS parameter that are pre-configured. Synching between the master and base stations 120 , 130 is achieved through multiple communication channels as managed by the wireless station 140 .
- a BSSID can be randomly generated and send form the configuration server 110 to both the master base station 120 and the slave base station 110 .
- the slave base station 110 uses the BSSID to send a probe request or respond to a beacon of the master base station 120 .
- Authentication credentials can also be presented by the slave base station 130 to the master base station 120 .
- Some of the dynamic WDS information can be static and predefined, such as authentication credentials.
- new dynamic WDS configuration data can be sent out to re-secure the compromised network.
- the configuration server 110 and other components of the system 100 can be any computerized device or processor driven device. Example embodiments include server blades, desktop computers, laptops, smart telephones, tablets, phablets and the like. In some cases, the configuration server 110 is operated by a service provider that services various user accounts. The configuration server 110 can be the same entity that manufactures the master and slave base stations 120 , 130 . More detailed embodiments of the configuration server 110 are set forth below with respect to FIG. 2 .
- the master base station 120 is configured to provide access to the network 101 for wireless stations including wireless station 140 . After configuration, wireless stations can be indirectly connected through the slave base station 130 . The indirect connection extends the range of the master base station 120 which appears to the wireless station 140 to be the same device as the master base station 120 , in some embodiments.
- a BSSID used to identify connections with the master base station 120 can be passed to the slave base station 130 .
- the station 110 communicates using a certain BSSID associated with both the master and slave base stations 120 , 130 , either device can process packets from communications.
- the master base station 120 can maintain a table that tracks which wireless stations are assigned to be handled by the slave base station 130 and other slave base stations.
- the master base station 120 can be an access point running in master node, a router, or a switch, and be implemented by any of the computerized devices discussed herein, and generally in FIG. 9 . More detailed embodiments of the master base station 130 are described in below with respect to FIG. 3 .
- the slave base station 130 is configured to provide access to the network 101 to wireless stations including the wireless station 140 .
- the slave station can communicate with the wireless station 140 over a Bluetooth wireless radio in order to receive WDS configuration data (e.g., dynamic WDS configuration data).
- WDS configuration data e.g., dynamic WDS configuration data
- packets are forwarded from the wireless station 130 to the master base station 120 , and vice versa.
- the slave base station 130 can be a range extender, a repeater, an access point running in a slave mode, and be implemented by any of the computerized devices discussed herein, and generally in FIG. 9 .
- the slave base station 130 is described in more detail below in association with FIG. 4 .
- the wireless station 140 synchronizes WDS configuration data between a Bluetooth transceiver connected to the slave base station 130 , and, in a first embodiment through a Wi-Fi transceiver connected to the master base station 120 , and, in a second embodiment through a cellular data network transceiver connected to the configuration server 110 .
- Other types of transceivers can also be substituted.
- the one-to-many capability of Bluetooth allows a single wireless station to configure many slave base stations without having to manually connect and disconnect between, for example, Wi-Fi transceivers of different slave base stations.
- Some embodiments include a mobile app with user log in information in order to create authenticated communication channels for passing sensitive configuration parameters.
- the wireless station 140 may also authenticate to the slave base station through the mobile app.
- the wireless station 140 can be a mobile telephone, a tablet, a phablet, a laptop, or be implemented by any of the computerized devices discussed herein, and generally in FIG. 9 .
- a smart phone is typically equipped with Wi-Fi, Bluetooth and cellular data network transceivers.
- a mobile app can be downloaded to coordinate between the heterogeneous communication channels. Examples wireless station 130 is described in more detail below in association with FIG. 5 .
- FIG. 1B in contrast to FIG. 1A , eliminates the configuration server 110 and connections with the network 101 .
- the locally based configuration features multiple connections over multiple channels to automatically configure wireless devices out of the box.
- the system 100 B includes the master base station 120 , slave base stations 130 A-C and the wireless station 140 .
- a network administrator uses the wireless station 140 to manage configuration of the base slave stations 130 A-C to the master base station 110 .
- the wireless station 140 uses Wi-Fi to connect with master base stations and uses Bluetooth to connect with slave base stations.
- the slave base stations 130 A-C can be physically distributed for deployment in different geographical locations.
- the configuration server 110 being accessible wherever cellular data network service is available, can configure slave base stations while already deployed to different geographical areas. More specifically, a network administrator can move to within Bluetooth range of each slave base station for automatic configuration to master base stations.
- a configuration server can be notified of off-line configurations at a later point in time, by any of the participating components.
- FIG. 2 is a more detailed block diagram illustrating the configuration server 110 of the system of FIG. 1 , according to one embodiment.
- the configuration server 110 of this embodiment includes a user account manager 210 , a configuration parameter database 220 , a configuration parameter generation engine 230 , a configuration parameter synching engine 240 , and a network communication module.
- the user account manager 210 preconfigures a user policy for friend onboarding.
- the user account is accessed through a user interface executing on a browser or an independent application.
- a network owner can access settings of the account. Although the description refers to a network owner throughout, this is non-limiting as other actors can include a network administrator, a home owner, an Internet customer, a hot spot operator, and the like.
- the configuration parameter database 220 stores the master base station 120 in association with the slave base station 130 , for example, on a user account record.
- the configuration server 110 automatically recognizes that the master base station 120 is associated with the slave base station 130 , based on geographical coordinates or network IP addresses.
- a wireless station has a mobile app for associating slave base stations to a master base station. To initiate, the mobile app collects and sends to the configuration server 110 , data about nearby slave base stations that is sent out in slave station beacons. As a result, the configuration parameter database 220 can be queried using the slave base station identification information to identify master base stations for automatic configuration. Then, configuration parameters such as a BSSID are sent to slave base stations for connecting to master slave stations.
- the configuration parameter generation engine 230 can create a BSSID in real-time that would be previously unknown to any rogue actors.
- the BSSID is synchronized to master base stations and slave base stations of a common local area network. In one case, authentication credentials are also synchronized for logging in from slave base stations.
- the generated parameters are sent to the networking communication module 240 for interfacing with external resources.
- the networking communication module 240 can comprise networking interface components such as Wi-Fi radios, Wi-Fi antennae, transceivers, coders and decoders, digital signal processors, and other supporting lower level hardware and processes necessary for communication across channels.
- the networking hardware 240 can support different variations of IEEE 802.11, including multiple input/multiple output (MIMO) and other techniques.
- a cellular data network e.g., Verizon 4G cellular data network
- a cellular data network including, for example, cell towers pass the data packets to wireless stations.
- FIG. 3 is a more detailed block diagram illustrating the master base station 120 of the system of FIG. 1 , according to one embodiment.
- the master base station 120 includes a configuration application 310 , a slave base station manager 320 , a wireless station manager 330 , and a networking communication module 340 .
- the configuration application 310 can be executed as part of an operating system, or alternatively, as an application interacting with an operating system.
- the configuration application 310 receives dynamic WDS confirmation data. Sometime thereafter, a connection request is received from a slave base station.
- the connection request can be a probe request using the BSSID generated in real-time during a configuration process.
- the configuration application 310 generates BSSIDs in real-time for transfer to slave base stations through connected wireless stations.
- the slave base station manager 320 registers slave base stations such as the slave base station 130 in association with a particular master slave station such as the master slave station 120 , including MAC addresses and BSSIDs.
- the wireless station manager 330 registers wireless stations directly connecting without an intervening slave base station. In some cases, wireless stations can be handed off to slave base stations, or handed off from slave base stations.
- the networking communication module 340 comprises a Bluetooth transceiver 342 (e.g., BLTE transceiver), a Wi-Fi transceiver 344 , and an Ethernet port 344 .
- IEEE 802.11 network packets are received from slave base stations, on behalf of wireless stations connected to slave stations.
- Wi-Fi network packets are transformed to Ethernet packets are forwarded as addressed.
- the reverse data path is also handled by the networking communication module 340 .
- Other embodiments with different transceivers are possible.
- FIG. 4 is a more detailed block diagram illustrating the slave base station 130 of the system of FIG. 1 , according to an embodiment.
- the slave base station 130 features a configuration application 410 , a slave base station manager 420 , a wireless station manager 430 , and a networking communication module 440 .
- the configuration application 410 can be executed as part of an operating system, or alternatively, as an application interacting with an operating system.
- the configuration application 410 receives dynamic WDS confirmation data.
- a connection request is received from a slave base station.
- the connection request can be a probe request using the BSSID generated in real-time during a configuration process.
- the configuration application 410 generates BSSIDs in real-time for transfer to slave base stations through connected wireless stations.
- the master base station manager 420 registers slave base stations such as the master base station 120 in association with a particular wireless station such as the wireless station 140 , including MAC addresses and BSSIDs. Some embodiments of the master base station manager 420 registers more than one master base stations, allowing assignments of wireless stations to different master base stations. Load balancing algorithms can determine the assignments of wireless stations to particular master base stations.
- the wireless station manager 430 registers wireless stations directly connecting with or without an intervening slave base station. In some cases, wireless stations can be handed off to master base stations or other slave base stations, or handed off from other slave base stations or master base stations.
- the networking communication module 440 comprises a Wi-Fi transceiver 442 and a Bluetooth transceiver 444 .
- Bluetooth packets are received with WDS configuration data.
- a BSSID can be embedded into a probe request sent to master base station with Wi-Fi data packets.
- IEEE 802.11 network packets are received from other downstream slave base stations, on behalf of wireless stations connected to those slave stations.
- IEEE 802.11 network packets are also received from wireless stations directly connected.
- Wi-Fi network packets are retransmitted as Wi-Fi network packets when forwarded to master base stations.
- the reverse data path is also handled by the networking communication module 440 .
- an Ethernet port or other type of transceiver can be included on the slave base station 130 .
- FIG. 5 is a more detailed block diagram illustrating the wireless station 140 of the system of FIG. 1 , according to an embodiment.
- the wireless station 140 includes a configuration application 510 , a master base station manager 520 , a slave base station manager 530 , and a networking communication module 540 .
- the configuration application 510 can be executed as part of an operating system, or alternatively, as an application interacting with an operating system.
- the configuration application 510 receives dynamic WDS confirmation data over a Wi-Fi or cellular network for retransmitting over a Bluetooth channel to slave base stations (and visa versa).
- the configuration application 510 is communicatively coupled with each of the transceivers for recognizing data that needs to be processed for transmission over a different transceiver.
- users can be prompted by the configuration application 510 to enter credentials for reaching a particular user account at the configuration server 110 .
- the master base station manager 520 registers master base stations such as the master base station 130 , including MAC addresses and BSSIDs.
- the slave base station manager 530 registers slave base stations directly connecting without an intervening slave base station. In some cases, wireless stations can be handed off to slave base stations, or handed off from slave base stations.
- the networking communication module 540 comprises a Wi-Fi transceiver 542 , a Bluetooth transceiver 544 , and a cellular data network transceiver 546 .
- FIGS. 6A-6B are sequence diagrams illustrating interactions 600 between components of the system in FIGS. 1A and 1B , accordingly.
- the specific interactions shown in FIGS. 6A-6B and described below can be performed in different orders, can include many sub-interactions, and still be contemplated by the present disclosure.
- the methods below of FIGS. 7-9 describe processes that are internal to the components, as opposed to the external messages exchanged in FIGS. 6A-B .
- the master base station 120 connect with the configuration module 110 (interaction 601 ).
- the slave base station after establishing a Bluetooth connection with the wireless station 140 (interactions 602 , 603 ), connects with the configuration module 110 through the wireless station 140 (interactions 604 ).
- WDS configuration data is sent to both the master base station 120 (interaction 605 ) and to the slave base station 130 through the wireless station 140 (interactions 606 , 607 ). Finally, the WDS configuration data is sent from the slave base station 130 to the master base station 120 (interaction 608 ) and an acknowledgment of the connection can be returned (interaction 609 ).
- the wireless station 140 connects with the master base station (interactions 611 , 613 ) and separately, the slave base stations 130 A-B (interactions 612 a,b , 614 a,b ).
- WDS configuration data is sent from the wireless station 140 to the master base station 120 ( 615 ) and the slave base stations 130 A-B (interactions 616 a,b ).
- the slave base stations 130 A-B connect directly to the master base station ( 617 a,b , 618 a,b ).
- FIG. 7 is a high-level flow diagram illustrating a method 700 for wirelessly configuring wireless distribution nodes from the wireless station 140 , according to one embodiment.
- the method 700 is one example of the operation for the system 100 or other referral systems, without limitation.
- a network configuration is detected.
- the network configuration can be an out of the box set up of a Wi-Fi network with range extenders.
- the network configuration can be a power down followed by a power up in which authentication is needed by base slave stations.
- wireless stations use a Bluetooth connection to synchronize WDS configuration data with slave base stations to facilitate a Wi-Fi connection between the slave base stations and the master base stations.
- the method 700 continues back to step 710 until another network configuration is detected.
- the next network configuration can involve a modification to the network configuration of the same user account, or can involve a different user account.
- FIG. 8 is a more detailed flow diagram illustrating step 720 A (first embodiment of the step 720 ) of synchronizing WDS configuration data between a master base station to a slave base station over an external network (e.g., see system 100 A of FIG. 1A ), from the method of FIG. 7 , according to an embodiment.
- a data connection is established with a master base station.
- master base stations are pre-configured with an IP address of a configuration server for automatically connecting.
- applications can send commands between the configuration server and the master base station. For example, users can log into user accounts on the configuration server with authentication credentials in order to add network devices to the user account for management.
- a data connection is established with a wireless station over a first transceiver, for example, for a cellular data network.
- a mobile app in wireless stations can also be pre-configured with an IP address of a configuration server for automatically connecting.
- a wireless station establishes a data connection with the slave base station over a second transceiver, for example, for a Bluetooth network.
- a mobile app of a wireless station communicates with an application on the slave base station.
- WDS configuration data is synchronized between the master and slave base stations.
- One embodiment generates WDS configuration data at either device which is securely transmitted to the slave base stations.
- FIG. 9 is a high-level flow diagram illustrating a step 720 B (second embodiment of the step 720 ) for wirelessly configuring wireless distribution nodes from a wireless station without use of an external network (e.g., see system 100 B of FIG. 1B ), according to one embodiment.
- the wireless station connects to a master base stations over a first transceiver, for example, for a Wi-Fi network.
- the wireless station connects to slave base stations over a second transceiver, for example, for a Bluetooth network.
- the wireless station synchronizes WDS configuration data between the master and slave base stations.
- dynamic WDS configuration data is generated by the wireless stations or the master base station.
- FIG. 10 is a block diagram illustrating an exemplary computing device 1000 for use in the systems 100 A-B of FIGS. 1A-B , according to one embodiment.
- the computing device 1000 is an exemplary device that is implementable for each of the components of the system 100 , including the cloud control element 110 , the access points 121 A,B, 131 , and the station 140 .
- the computing device 1000 can be a mobile computing device, a laptop device, a smartphone, a tablet device, a phablet device, a video game console, a personal computing device, a stationary computing device, a server blade, an Internet appliance, a virtual computing device, a distributed computing device, a cloud-based computing device, or any appropriate processor-driven device.
- the computing device 1000 includes a memory 1010 , a processor 1020 , a storage drive 1030 , and an I/O port 1040 . Each of the components is coupled for electronic communication via a bus 1099 . Communication can be digital and/or analog, and use any suitable protocol.
- the memory 1010 further comprises network applications 1012 and an operating system 1014 .
- the network applications 1012 can include the modules of the components illustrated in FIG. 1 .
- Other network applications 1012 can include a web browser, a mobile application, an application that uses networking, a remote application executing locally, a network protocol application, a network management application, a network routing application, or the like.
- the operating system 1014 can be one of the Microsoft Windows® family of operating systems (e.g., Windows 95, 98, Me, Windows NT, Windows 2000, Windows XP, Windows XP x64 Edition, Windows Vista, Windows CE, Windows Mobile, Windows 8 or Windows 10), Linux, HP-UX, UNIX, Sun OS, Solaris, Mac OS X, Alpha OS, AIX, IRIX32, or IRIX64. Other operating systems may be used. Microsoft Windows is a trademark of Microsoft Corporation.
- the processor 1020 can be a network processor (e.g., optimized for IEEE 802.11), a general purpose processor, an application-specific integrated circuit (ASIC), a field programmable gate array (FPGA), a reduced instruction set controller (RISC) processor, an integrated circuit, or the like. Qualcomm Atheros, Broadcom Corporation, and Marvell Semiconductors manufacture processors that are optimized for IEEE 802.11 devices.
- the processor 1020 can be single core, multiple core, or include more than one processing elements.
- the processor 1020 can be disposed on silicon or any other suitable material.
- the processor 1020 can receive and execute instructions and data stored in the memory 1010 or the storage drive 1030 .
- the storage drive 1030 can be any non-volatile type of storage such as a magnetic disc, EEPROM, Flash, or the like.
- the storage drive 630 stores code and data for applications.
- the I/O port 1040 further comprises a user interface 1042 and a network interface 1044 .
- the user interface 642 can output to a display device and receive input from, for example, a keyboard.
- the network interface 1044 e.g. RF antennae
- Computer software products may be written in any of various suitable programming languages, such as C, C++, C#, Oracle® Java, JavaScript, PHP, Python, Perl, Ruby, AJAX, and Adobe® Flash®.
- the computer software product may be an independent application with data input and data display modules.
- the computer software products may be classes that are instantiated as distributed objects.
- the computer software products may also be component software such as Java Beans (from Sun Microsystems) or Enterprise Java Beans (EJB from Sun Microsystems).
- the computer that is running the previously mentioned computer software may be connected to a network and may interface to other computers using this network.
- the network may be on an intranet or the Internet, among others.
- the network may be a wired network (e.g., using copper), telephone network, packet network, an optical network (e.g., using optical fiber), or a wireless network, or any combination of these.
- data and other information may be passed between the computer and components (or steps) of a system of the invention using a wireless network using a protocol such as Wi-Fi (IEEE standards 802.11, 802.11a, 802.11b, 802.11e, 802.11g, 802.11i, 802.11n, and 802.11ac, just to name a few examples).
- Wi-Fi IEEE standards 802.11, 802.11a, 802.11b, 802.11e, 802.11g, 802.11i, 802.11n, and 802.11ac, just to name a few examples.
- signals from a computer may be transferred, at least
- a user accesses a system on the World Wide Web (WWW) through a network such as the Internet.
- WWW World Wide Web
- the Web browser is used to download web pages or other content in various formats including HTML, XML, text, PDF, and postscript, and may be used to upload information to other parts of the system.
- the Web browser may use uniform resource identifiers (URLs) to identify resources on the Web and hypertext transfer protocol (HTTP) in transferring files on the Web.
- URLs uniform resource identifiers
- HTTP hypertext transfer protocol
Abstract
Description
Claims (8)
Priority Applications (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US15/391,790 US10390217B2 (en) | 2016-12-27 | 2016-12-27 | Wireless configuration of wireless distribution system (WDS) Wi-Fi range extenders using non-Wi-Fi-wireless communication channels |
US15/476,851 US10205724B2 (en) | 2016-12-27 | 2017-03-31 | Cloud-based onboarding of cloud-controlled Wi-Fi network devices |
US15/489,586 US10257036B2 (en) | 2016-12-27 | 2017-04-17 | Secure plug and play configuration of wireless distribution system (WDS) Wi-Fi range extenders |
US16/459,599 US11019560B2 (en) | 2015-09-16 | 2019-07-01 | Selective cloud-based SSID (service set identifier) steering for allowing different levels of access for wireless network friends when onboarding on Wi-Fi networks |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US15/391,790 US10390217B2 (en) | 2016-12-27 | 2016-12-27 | Wireless configuration of wireless distribution system (WDS) Wi-Fi range extenders using non-Wi-Fi-wireless communication channels |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US15/255,734 Continuation-In-Part US20170078880A1 (en) | 2015-09-16 | 2016-09-02 | Cloud-based friend onboarding for wi-fi network communication authentication |
Related Child Applications (3)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US15/476,851 Continuation-In-Part US10205724B2 (en) | 2016-12-27 | 2017-03-31 | Cloud-based onboarding of cloud-controlled Wi-Fi network devices |
US15/489,586 Continuation-In-Part US10257036B2 (en) | 2016-12-27 | 2017-04-17 | Secure plug and play configuration of wireless distribution system (WDS) Wi-Fi range extenders |
US16/459,599 Continuation-In-Part US11019560B2 (en) | 2015-09-16 | 2019-07-01 | Selective cloud-based SSID (service set identifier) steering for allowing different levels of access for wireless network friends when onboarding on Wi-Fi networks |
Publications (2)
Publication Number | Publication Date |
---|---|
US20180184283A1 US20180184283A1 (en) | 2018-06-28 |
US10390217B2 true US10390217B2 (en) | 2019-08-20 |
Family
ID=62625596
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US15/391,790 Expired - Fee Related US10390217B2 (en) | 2015-09-16 | 2016-12-27 | Wireless configuration of wireless distribution system (WDS) Wi-Fi range extenders using non-Wi-Fi-wireless communication channels |
Country Status (1)
Country | Link |
---|---|
US (1) | US10390217B2 (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110808867A (en) * | 2020-01-08 | 2020-02-18 | 深圳市乙辰科技股份有限公司 | Network equipment configuration method and network equipment system |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109195141B (en) * | 2018-07-25 | 2021-09-10 | 京信网络***股份有限公司 | Base station opening method and device, computer storage medium and equipment |
US10820285B2 (en) * | 2018-11-26 | 2020-10-27 | Hitron Technologies Inc. | Method for network synchronization |
CN110675873B (en) * | 2019-09-29 | 2023-02-07 | 百度在线网络技术(北京)有限公司 | Data processing method, device and equipment of intelligent equipment and storage medium |
Citations (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20130304879A1 (en) | 2012-04-16 | 2013-11-14 | Vodafone Holding Gmbh | Configuration of an end device for an access to a wireless communication network |
US20140073289A1 (en) | 2012-09-11 | 2014-03-13 | Wavemax Corp. | 3g/4g mobile data offload via roaming in a network of shared protected/locked wi-fi access points |
US20150077231A1 (en) | 2013-05-17 | 2015-03-19 | Huawei Technologies Co., Ltd. | Method, apparatus, and system for intelligently controlling device, and plug-and-play device |
US20150078342A1 (en) * | 2012-05-30 | 2015-03-19 | Huawei Technologies Co., Ltd. | Method for configuring multiflow, base station, radio network controller, and user equipment |
US20150081837A1 (en) | 2013-09-13 | 2015-03-19 | Google Inc. | Provisioning a plurality of computing devices |
US9143400B1 (en) | 2012-05-01 | 2015-09-22 | Google Inc. | Network gateway configuration |
US20160219631A1 (en) * | 2015-01-26 | 2016-07-28 | Arris Enterprises, Inc. | Automatic Configuration of a Wireless Distribution System Extended Network |
US9609519B2 (en) | 2013-05-10 | 2017-03-28 | Relay2, Inc. | Cloud-based site-to-site virtual private network |
US20170111173A1 (en) * | 2014-04-02 | 2017-04-20 | Panasonic Intellectual Property Management Co., Ltd. | Wireless communications device and control method for wireless communications device |
US20170134940A1 (en) | 2015-11-09 | 2017-05-11 | Meru Networks | Selective key caching for fast roaming of wireless stations in communication networks |
US20170135085A1 (en) | 2015-11-10 | 2017-05-11 | Meru Networks | Optimization of mu-mimo beamforming in a wi-fi communication network based on mobility profiles |
US20170289885A1 (en) | 2016-03-30 | 2017-10-05 | Meru Networks | Reliable call hand-off from cellular networks to wi-fi networks |
US20170300732A1 (en) | 2015-09-16 | 2017-10-19 | CloudMondo, Inc. | Cloud-based authentication of user devices for onboarding to a wi-fi network |
-
2016
- 2016-12-27 US US15/391,790 patent/US10390217B2/en not_active Expired - Fee Related
Patent Citations (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20130304879A1 (en) | 2012-04-16 | 2013-11-14 | Vodafone Holding Gmbh | Configuration of an end device for an access to a wireless communication network |
US9143400B1 (en) | 2012-05-01 | 2015-09-22 | Google Inc. | Network gateway configuration |
US20150078342A1 (en) * | 2012-05-30 | 2015-03-19 | Huawei Technologies Co., Ltd. | Method for configuring multiflow, base station, radio network controller, and user equipment |
US20140073289A1 (en) | 2012-09-11 | 2014-03-13 | Wavemax Corp. | 3g/4g mobile data offload via roaming in a network of shared protected/locked wi-fi access points |
US9609519B2 (en) | 2013-05-10 | 2017-03-28 | Relay2, Inc. | Cloud-based site-to-site virtual private network |
US20150077231A1 (en) | 2013-05-17 | 2015-03-19 | Huawei Technologies Co., Ltd. | Method, apparatus, and system for intelligently controlling device, and plug-and-play device |
US20150081837A1 (en) | 2013-09-13 | 2015-03-19 | Google Inc. | Provisioning a plurality of computing devices |
US20170111173A1 (en) * | 2014-04-02 | 2017-04-20 | Panasonic Intellectual Property Management Co., Ltd. | Wireless communications device and control method for wireless communications device |
US20160219631A1 (en) * | 2015-01-26 | 2016-07-28 | Arris Enterprises, Inc. | Automatic Configuration of a Wireless Distribution System Extended Network |
US20170300732A1 (en) | 2015-09-16 | 2017-10-19 | CloudMondo, Inc. | Cloud-based authentication of user devices for onboarding to a wi-fi network |
US20170134940A1 (en) | 2015-11-09 | 2017-05-11 | Meru Networks | Selective key caching for fast roaming of wireless stations in communication networks |
US20170135085A1 (en) | 2015-11-10 | 2017-05-11 | Meru Networks | Optimization of mu-mimo beamforming in a wi-fi communication network based on mobility profiles |
US20170289885A1 (en) | 2016-03-30 | 2017-10-05 | Meru Networks | Reliable call hand-off from cellular networks to wi-fi networks |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110808867A (en) * | 2020-01-08 | 2020-02-18 | 深圳市乙辰科技股份有限公司 | Network equipment configuration method and network equipment system |
CN110808867B (en) * | 2020-01-08 | 2020-04-07 | 深圳市乙辰科技股份有限公司 | Network equipment configuration method and network equipment system |
Also Published As
Publication number | Publication date |
---|---|
US20180184283A1 (en) | 2018-06-28 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11133985B2 (en) | Systems and methods for intuitive home networking | |
EP3151628B1 (en) | Method, device and system for accessing a wireless network | |
US10129755B2 (en) | Deauthenticating and disassociating unauthorized access points with spoofed management frames | |
US10432463B2 (en) | Fast BSS transitions between access points for stations of cloud-controlled Wi-Fi networks | |
US10257036B2 (en) | Secure plug and play configuration of wireless distribution system (WDS) Wi-Fi range extenders | |
EP3531793B1 (en) | Repeating method of wireless repeating device, and wireless repeating device | |
US10887804B2 (en) | Pre-roaming security key distribution for faster roaming transitions over cloud-managed Wi-Fi networks of heterogeneous IP subnets | |
US10390217B2 (en) | Wireless configuration of wireless distribution system (WDS) Wi-Fi range extenders using non-Wi-Fi-wireless communication channels | |
US9922225B2 (en) | Cloud-based authentication of user devices for onboarding to a Wi-Fi network | |
CN107567017B (en) | Wireless connection system, device and method | |
US10070359B2 (en) | Dynamic generation of per-station realm lists for hot spot connections | |
US11019560B2 (en) | Selective cloud-based SSID (service set identifier) steering for allowing different levels of access for wireless network friends when onboarding on Wi-Fi networks | |
CN103442358A (en) | Method for local forwarding concentrated authentication and control device | |
US10044840B2 (en) | Zero configuration of an access point connecting to a mesh network | |
US11812262B2 (en) | Device authentication | |
US20230096372A1 (en) | Localized authorization for secure communication | |
CN105072666A (en) | WIFI hot spot connection control method, server, and WIFI hot spot | |
US10205724B2 (en) | Cloud-based onboarding of cloud-controlled Wi-Fi network devices | |
US10785703B1 (en) | Preventing connections to unauthorized access points with channel switch announcements | |
US10785114B2 (en) | Fingerprinting BYOD (bring your own device) and IOT (internet of things) IPV6 stations for network policy enforcement | |
CN108307683A (en) | The means of communication, micro-base station, micro-base station controller, terminal and system | |
WO2016027000A1 (en) | Use of device subscription | |
CN103973570A (en) | Message transmission method, AP (access point) and message transmission system | |
US20230336983A1 (en) | Establishing a backup connectivity between a sensor and a management system | |
CN114258011B (en) | Information sending method, information receiving method, information sending device, information receiving device and terminal |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: CLOUDMONDO, INC., CALIFORNIA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:SINGH, RAJINDER;REEL/FRAME:040777/0119 Effective date: 20161227 |
|
AS | Assignment |
Owner name: NEUTRINO8, INC., CALIFORNIA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:CLOUDMONDO, INC.;REEL/FRAME:047936/0809 Effective date: 20190102 |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: NOTICE OF ALLOWANCE MAILED -- APPLICATION RECEIVED IN OFFICE OF PUBLICATIONS |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: AWAITING TC RESP, ISSUE FEE PAYMENT RECEIVED |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: AWAITING TC RESP, ISSUE FEE PAYMENT VERIFIED |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: PUBLICATIONS -- ISSUE FEE PAYMENT VERIFIED |
|
STCF | Information on status: patent grant |
Free format text: PATENTED CASE |
|
FEPP | Fee payment procedure |
Free format text: MAINTENANCE FEE REMINDER MAILED (ORIGINAL EVENT CODE: REM.); ENTITY STATUS OF PATENT OWNER: SMALL ENTITY |
|
LAPS | Lapse for failure to pay maintenance fees |
Free format text: PATENT EXPIRED FOR FAILURE TO PAY MAINTENANCE FEES (ORIGINAL EVENT CODE: EXP.); ENTITY STATUS OF PATENT OWNER: SMALL ENTITY |
|
STCH | Information on status: patent discontinuation |
Free format text: PATENT EXPIRED DUE TO NONPAYMENT OF MAINTENANCE FEES UNDER 37 CFR 1.362 |
|
FP | Lapsed due to failure to pay maintenance fee |
Effective date: 20230820 |